Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Alternativ können Sie versuchen, selbst über Ihren lokalen Bibliothekskatalog auf das gewünschte Dokument zuzugreifen.
Bei Zugriffsproblemen kontaktieren Sie uns gern.
Understanding digital forensics -- Investigate process models -- Evidence management -- Understanding forensic readiness -- Define business risk scenarios -- Identity potential data sources -- Determine collection requirements -- Establish legal admissibility -- Establish secure storage and handling -- Enable targeted monitoring -- Map investigative workflows -- Establish continuing education -- Maintain evidence-based reporting -- Ensure legal review -- Accomplishing forensic readiness -- Appendices: A. Investigative process models -- B. Education and professional certifications -- C. Tool and equipment validation program -- D. Service catalog -- E. Cost-benefit analysis -- F. Building taxonomy -- G. Risk assessment -- H. Threat modeling -- I. Data warehouse introduction -- J. Requirements analysis -- K. Investigative workflow -- Templates: A. Test case document -- B. Investigator logbook -- C. Chain of custody tracking form -- D. Investigative final report -- E. Service catalog -- F. Business case document -- G. Net present value -- H. Threat/risk assessment report -- I. Data source inventory matrix -- J. Project charter document -- K. Requirements specification document.
Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition presents the optimal way for digital forensic and IT security professionals to implement a proactive approach to digital forensics. The book details how digital forensic processes can align strategically with business operations and an already existing information and data security program. Detailing proper collection, preservation, storage, and presentation of digital evidence, the procedures outlined illustrate how digital evidence can be an essential tool in mitigating risk and redusing the impact of both internal and external, digital incidents, disputes, and crimes. By utilizing a digital forensic readiness approach and stances, a company's preparedness and ability to take action quickly and respond as needed. In addition, this approach enhances the ability to gather evidence, as well as the relevance, reliability, and credibility of any such evidence. New chapters to this edition include Chapter 4 on Code of Ethics and Standards, Chapter 5 on Digital Forensics as a Business, and Chapter 10 on Establishing Legal Admissibility. This book offers best practices to professionals on enhancing their digital forensic program, or how to start and develop one the right way for effective forensic readiness in any corporate or enterprise setting
Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition presents the optimal way for digital forensic and IT security professionals to implement a proactive approach to digital forensics. The book details how digital forensic processes can align strategically with business operations and an already existing information and data security program. Detailing proper collection, preservation, storage, and presentation of digital evidence, the procedures outlined illustrate how digital evidence can be an essential tool in mitigating risk and redusing the impact of both internal and external, digital incidents, disputes, and crimes. By utilizing a digital forensic readiness approach and stances, a company's preparedness and ability to take action quickly and respond as needed. In addition, this approach enhances the ability to gather evidence, as well as the relevance, reliability, and credibility of any such evidence. New chapters to this edition include Chapter 4 on Code of Ethics and Standards, Chapter 5 on Digital Forensics as a Business, and Chapter 10 on Establishing Legal Admissibility. This book offers best practices to professionals on enhancing their digital forensic program, or how to start and develop one the right way for effective forensic readiness in any corporate or enterprise setting.
2 -- Investigative Process ModelsINTRODUCTION; EXISTING PROCESS MODELS; DIGITAL FORENSIC READINESS MODEL; SUMMARY; 3 -- Evidence Management; INTRODUCTION; EVIDENCE RULES; PREPARATION; INFORMATION SECURITY MANAGEMENT; Policies; Guidelines; Standards; Procedures; DIGITAL FORENSIC TEAM; Roles and Responsibilities; Education and Certification; LAB ENVIRONMENT; HARDWARE AND SOFTWARE; GATHERING; OPERATING PROCEDURES; Identification; Securing the Scene; Documenting the Scene; Search and Seizure; Collection and Preservation; PROCESSING; PRESENTATION; SUMMARY; RESOURCES; TAXONOMY.
Front Cover -- Implementing Digital Forensic Readiness -- Copyright -- Contents -- Preface -- Introduction -- About the Author -- Acknowledgments -- A - Digital Forensics -- 1 - Understanding Digital Forensics -- INTRODUCTION -- HISTORY OF DIGITAL CRIME AND FORENSICS -- PROLOGUE (1960-80) -- INFANCY (1980-95) -- CHILDHOOD (1995-2005) -- ADOLESCENCE (2005-15) -- THE FUTURE (2015 AND BEYOND) -- DIGITAL FORENSICS OVERVIEW -- WHY IS IT IMPORTANT? -- LEGAL ASPECTS -- COLLECTING DIGITAL EVIDENCE -- VOLATILE DATA -- NONVOLATILE DATA -- ORDER OF VOLATILITY -- TYPES OF FORENSIC INVESTIGATIONS
2 -- Investigative Process ModelsINTRODUCTION; EXISTING PROCESS MODELS; DIGITAL FORENSIC READINESS MODEL; SUMMARY; 3 -- Evidence Management; INTRODUCTION; EVIDENCE RULES; PREPARATION; INFORMATION SECURITY MANAGEMENT; Policies; Guidelines; Standards; Procedures; DIGITAL FORENSIC TEAM; Roles and Responsibilities; Education and Certification; LAB ENVIRONMENT; HARDWARE AND SOFTWARE; GATHERING; OPERATING PROCEDURES; Identification; Securing the Scene; Documenting the Scene; Search and Seizure; Collection and Preservation; PROCESSING; PRESENTATION; SUMMARY; RESOURCES; TAXONOMY.
Problem melden